× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 9d66323794d493a1deaab66e36d36a820d814ee4dd50d64cddf039c2a06463a5
File name: 2b43a381744a6c0b3c942b853a726b8cc818614f_exploit.ht
Detection ratio: 37 / 59
Analysis date: 2018-02-13 17:36:04 UTC ( 8 months ago )
Antivirus Result Update
Ad-Aware JS:Exploit.JS.Agent.AQ 20180213
AegisLab Troj.Downloader.HTML.SWFLoad.g!c 20180213
AhnLab-V3 JS/Dufmoh 20180213
ALYac Exploit.HTML.Downloader 20180213
Arcabit JS:Exploit.JS.Agent.AQ 20180213
Avast JS:Fload-B [Trj] 20180213
AVG JS:Fload-B [Trj] 20180213
Avira (no cloud) HTML/Flashload.C 20180213
AVware Trojan-Downloader.HTML.SWFLoad.h (v) 20180210
BitDefender JS:Exploit.JS.Agent.AQ 20180213
CAT-QuickHeal JS.Downloader.AM 20180213
Comodo UnclassifiedMalware 20180213
DrWeb Exploit.CVE-2012-4969.1 20180213
Emsisoft JS:Exploit.JS.Agent.AQ (B) 20180213
F-Secure Exploit:W32/Defeater.C 20180213
GData JS:Exploit.JS.Agent.AQ 20180213
Ikarus Trojan-Downloader.HTML.SWFLoad 20180213
Jiangmin Trojan/Script.Gen 20180213
K7AntiVirus Trojan ( 003e317b1 ) 20180213
K7GW Trojan ( 003e317b1 ) 20180213
Kaspersky Trojan-Downloader.HTML.SWFLoad.l 20180213
MAX malware (ai score=97) 20180213
McAfee Exploit-CVE2012-4969 20180213
McAfee-GW-Edition Exploit-CVE2012-4969 20180213
Microsoft Exploit:Win32/CVE-2012-4969.C 20180213
eScan JS:Exploit.JS.Agent.AQ 20180213
NANO-Antivirus Trojan.Script.SWFLoad.xpnwf 20180213
Panda Exploit/CVE-2012-4969 20180213
Qihoo-360 Win32/Trojan.Downloader.170 20180213
Sophos AV Exp/20124969-A 20180213
Symantec Bloodhound.Exploit.474 20180213
Tencent Win32.Trojan-downloader.Swfload.Pdwn 20180213
TrendMicro HTML_EXPDROP.SMA 20180213
TrendMicro-HouseCall HTML_EXPDROP.SMA 20180213
VIPRE Trojan-Downloader.HTML.SWFLoad.h (v) 20180213
ViRobot HTML.S.CVE-2012-4969.304 20180213
ZoneAlarm by Check Point Trojan-Downloader.HTML.SWFLoad.l 20180213
Alibaba 20180209
Antiy-AVL 20180213
Avast-Mobile 20180213
Baidu 20180208
Bkav 20180212
ClamAV 20180213
CMC 20180213
CrowdStrike Falcon (ML) 20170201
Cybereason None
Cylance 20180213
Cyren 20180213
eGambit 20180213
Endgame 20171130
ESET-NOD32 20180213
F-Prot 20180213
Fortinet 20180213
Sophos ML 20180121
Kingsoft 20180213
Malwarebytes 20180213
nProtect 20180213
Palo Alto Networks (Known Signatures) 20180213
Rising 20180213
SentinelOne (Static ML) 20180115
SUPERAntiSpyware 20180213
Symantec Mobile Insight 20180212
TheHacker 20180213
Trustlook 20180213
VBA32 20180213
Webroot 20180213
WhiteArmor 20180205
Yandex 20180213
Zillya 20180213
Zoner 20180213
File identification
MD5 4f1dfed17cf7d1a1d9f61e1ad2c03624
SHA1 2b43a381744a6c0b3c942b853a726b8cc818614f
SHA256 9d66323794d493a1deaab66e36d36a820d814ee4dd50d64cddf039c2a06463a5
ssdeep
6:qAwtPloVGLc5JoqJdnIiFE9L8mgO9lVSnIbA4Fu5NsWA/HPq/nPV3pnSEGv:tSK4KJoidnIiSCu8nIpF+NsxHPs9SEGv

File size 304 bytes ( 304 bytes )
File type HTML
Magic literal
HTML document text

TrID file seems to be plain text/ASCII (0.0%)
Tags
exploit html cve-2012-4969

VirusTotal metadata
First submission 2012-09-15 12:06:17 UTC ( 6 years, 1 month ago )
Last submission 2018-02-13 17:36:04 UTC ( 8 months ago )
File names 8pXgfGCCre.xltm
2251425
Exploit.html
4f1dfed17cf7d1a1d9f61e1ad2c03624
4F1DFED17CF7D1A1D9F61E1AD2C03624.bin
2b43a381744a6c0b3c942b853a726b8cc818614f_exploit.ht
vti-rescan
output.2251425.txt
Exploit.html-
Uz1NN.bmp
exdrop-II.html-1
exploit.html
4F1DFED17CF7D1A1D9F61E1AD2C03624
file-4525722_
Untitled
ExifTool file metadata
MIMEType
text/html

FileType
HTML

FileTypeExtension
html

No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!